from ideas to solutions

The Latest Blog Posts
  • MSDN Student Flash

    U.S. Government Tales... Cracking 256-bit encryption

    The Washington Post is reporting on the U.S. Governments Distributed Network Attack (DNA) is used to crack seized computers for governmental investigation. How do they manage to brute force 256-bit encryption you ask? The answer is you! Humans are no...
  • Antimail

    Puzzle: How many witches are there?

    It is known that in a certain city there are a significant number of witches, even though this practice is forbidden. The problem is that nobody knows who these witches are, since a witch is very careful to appear to others as a perfectly normal person...
  • Jamie's Junk

    Time Series Prediction

    Last week I was playing around with the Time Series algorithm - ok I was showing a customer - and I wanted to show the prediction language used to display the charts. So I used the tools and showed them the basic prediction query for forecasting, but...
  • Windows Embedded Standard (Standard 7, Standard 2009, XPe...)

    Will we ever compete on footprint?

    I dream of a day when Windows Embedded can fit into form factors like this article on Slashdot refers to: “ World's Smallest Linux Box Fits in RJ-45 Jack ” (it's an ARM proc). And some of you will chortle and say “keep dreaming”. <grin> Of course...
  • Man vs Code

    Stop, Drop, and Roll

    A couple of weeks ago, I made a post that I thought some sort of client side data structure, which was designed to store projections of a domain model instances (both in memory and persisted in a data store), was a necessary part of any O/R framework...
  • Jesper snackar dynga då och då. Här är beviset.

    Hardware review: Humanscale Whale Mouse

    For a few years, I was suffering slightly from Carpal Tunnel Syndrome. This is self-diagnosed, of course, I never tried to get treatment for it. Can't go to the doctor for every little thing... Instead, I tried switching mouse-hand, but that only moved...
  • Eric Jarvi

    rootkit revealer

    FYI - some rootkit defense information New and Improved Rootkit Revealer (Sysinternals) Rootkit Revealer vs. Hacker Defender... (Robert Hensing's blog) Rootkit Detection Treasure Trove (Wilders) Strider Ghostbuster Rootkit Detection (Microsoft Research...
  • VolkerW's WebLog

    Microsoft and HPC? Of course!

    You certainly want to hear more about what is going on inside Microsoft with the upcoming CCE version of Windows Server. CCE stands for Compute Cluster Edition . Details on this SKU will have to wait a bit. But wrt HPC, Microsoft is working with many...
  • Riding Herd

    Getting decent wireless connectivity at PDC

    I've seen several comments about the issues with WLAN accessibility at PDC '03. I am delighted to say that there is someone thinking hard about how to improve the situation for PDC ’05, and even more delighted still to say that it isn’t me. I missed the...
  • Sara Ford's Weblog

    Use Ctrl-K Ctrl-C to comment selection and Ctrl-K Ctrl-U to uncomment selection

    This tip will work for both Visual Studio .NET 2003 and Visual Studio 2005. I use this feature all the time. These commands will comment / uncomment the current line if there is no selection. Based on the feedback and comments, it seems that people like...
  • Michael Howard's Web Log

    Clinic 2806: Microsoft Security Guidance Training for Developers

    I'd totally forgotten about this, but Microsoft eLearning has made available, "Clinic 2806: Microsoft Security Guidance Training for Developers" It's a free on-line clinic that lasts about 6 hours aimed squarely at developers. It covers, among other things...
  • One Louder interview with Gerry Crispin

    Peter Clayton interviews Gerry Crispin on . If you are in recruiting and you don't know Gerry , you should get to know him. He's one of those people that always has something interesting to say (and I'm not just saying that because my name came...
Page 32478 of 34,974 (419,679 items) «3247632477324783247932480»